jpcsmith / wf-in-the-age-of-quicView external linksLinks
This repository contains the code for the paper "Website Fingerprinting in the Age of QUIC" (PETS 2021).
☆22Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for wf-in-the-age-of-quic
Users that are interested in wf-in-the-age-of-quic are comparing it to the libraries listed below
Sorting:
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆196Mar 25, 2023Updated 2 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆136Oct 30, 2023Updated 2 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆56Jun 14, 2024Updated last year
- ☆22Feb 14, 2020Updated 6 years ago
- ☆28May 6, 2021Updated 4 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- ☆13Oct 6, 2020Updated 5 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- Python implementation of 'Secure Spread Spectrum Watermarking for Multimedia' (Cox et al., 1997) using Numpy, Scipy, Pillow☆11Jun 29, 2018Updated 7 years ago
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 8 months ago
- Implementation of cryptographic primitives in Go☆13Mar 13, 2023Updated 2 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- An implementation of RaFM. Xiaoshuang Chen, Yin Zheng, Jiaxiang Wang, et al. "RaFM: Rank-Aware Factorization Machines"☆12May 11, 2019Updated 6 years ago
- Common MPC Pitfalls☆12Updated this week
- A Vue Tab Bar Navigator of Mobile App☆11Jul 10, 2017Updated 8 years ago
- The all-in-one Sailfish OS local development bootstrapping script☆10Aug 23, 2022Updated 3 years ago
- The 2024 HTTP Workshop☆11Jan 8, 2025Updated last year
- ☆13Feb 15, 2020Updated 6 years ago
- MacOS 12.2.1 Monterey compatible version of dyld_shared_cache_util☆15Feb 28, 2022Updated 3 years ago
- IETF I-D for Network Time Security☆11Mar 25, 2020Updated 5 years ago
- Implementation of SoftSpokenOT. Forked from libOTe.☆10May 6, 2024Updated last year
- Privacy-preserving EigenShare DEX☆12May 22, 2022Updated 3 years ago
- Use disassemble/assemble technology to porting lewa to misc android device☆13Nov 14, 2014Updated 11 years ago
- A collection of useful GDB command extensions written using the GDB python API☆11Feb 15, 2018Updated 8 years ago
- A C++ library for DANE protocols, focusing on secure email☆12Apr 18, 2017Updated 8 years ago
- Materials accompanying "Implementing an Elliptic Curve in Go"☆13Jul 29, 2017Updated 8 years ago
- ☆12May 7, 2021Updated 4 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Code for zero-knowledge middleboxes☆63Jul 26, 2022Updated 3 years ago
- Website and charter of the Privacy Community Group☆14Mar 12, 2025Updated 11 months ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Sep 23, 2021Updated 4 years ago
- Implementation of the paper "Minipatch: Undermining DNN-based Website Fingerprinting with Adversarial Patches" which is published in IEEE…☆10Jul 25, 2022Updated 3 years ago
- ONOS_OVS_Manager_Bootcamp2016☆10Mar 28, 2017Updated 8 years ago
- Elliptic Curve Diffie Hellman with OpenSSL☆11Sep 10, 2013Updated 12 years ago
- A halo2 implementation of on-chain DCAP attestation verification☆15Sep 9, 2024Updated last year